All the vulnerabilites related to Dataprobe, Inc. - Dataprobe iBoot-PDU FW
cve-2022-4945
Vulnerability from cvelistv5
Published
2023-05-22 21:15
Modified
2024-08-03 01:55
Severity ?
EPSS score ?
Summary
CVE-2022-4945
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:55:46.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The Dataprobe cloud usernames and passwords are stored in plain text in a specific file. Any user able to read this specific file from the device could compromise other devices connected to the user\u0027s cloud." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-256 Plaintext Storage of a Password", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T21:15:33.441Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-4945", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-4945" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-4945", "datePublished": "2023-05-22T21:15:33.441Z", "dateReserved": "2023-04-26T15:24:49.548Z", "dateUpdated": "2024-08-03T01:55:46.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46658
Vulnerability from cvelistv5
Published
2023-05-22 22:46
Modified
2024-08-03 14:39
Severity ?
EPSS score ?
Summary
CVE-2022-46658
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The affected product is vulnerable to a stack-based buffer overflow which could lead to a denial of service or remote code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:47:02.167Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-46658", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-46658" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-46658", "datePublished": "2023-05-22T22:46:13.216Z", "dateReserved": "2022-12-21T17:02:52.840Z", "dateUpdated": "2024-08-03T14:39:38.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47320
Vulnerability from cvelistv5
Published
2023-05-22 22:30
Modified
2024-08-03 14:47
Severity ?
EPSS score ?
Summary
CVE-2022-47320
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:47:29.528Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The iBoot device\u2019s basic discovery protocol assists in initial device configuration. The discovery protocol shows basic information about devices on the network and allows users to perform configuration changes." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:30:59.073Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-47320", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-47320" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-47320", "datePublished": "2023-05-22T22:30:59.073Z", "dateReserved": "2022-12-21T17:02:52.826Z", "dateUpdated": "2024-08-03T14:47:29.528Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-46738
Vulnerability from cvelistv5
Published
2023-05-22 22:36
Modified
2024-08-03 14:39
Severity ?
EPSS score ?
Summary
CVE-2022-46738
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:39:38.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The affected product exposes multiple sensitive data fields of the affected product. An attacker can use the SNMP command to get device mac address and login as admin." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-1391 Use of Weak Credentials", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:36:40.682Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-46738", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-46738" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-46738", "datePublished": "2023-05-22T22:36:40.682Z", "dateReserved": "2022-12-21T17:02:52.835Z", "dateUpdated": "2024-08-03T14:39:38.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-47311
Vulnerability from cvelistv5
Published
2023-05-22 22:12
Modified
2024-08-03 14:47
Severity ?
EPSS score ?
Summary
CVE-2022-47311
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Dataprobe, Inc. | Dataprobe iBoot-PDU FW |
Version: 0 < 1.42.06162022 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:47:29.368Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "tags": [ "x_transferred" ], "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Dataprobe iBoot-PDU FW", "vendor": "Dataprobe, Inc.", "versions": [ { "lessThan": "1.42.06162022", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A proprietary protocol for iBoot devices is used for control and keepalive commands. The function compares the username and password; it also contains the configuration data for the user specified. If the user does not exist, then it sends a value for username and password, which allows successful authentication for a connection." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-288 Authentication Bypass Using an Alternate Path or Channel", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-22T22:12:51.152Z", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03" }, { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf" } ], "source": { "discovery": "UNKNOWN" }, "title": "CVE-2022-47311", "x_generator": { "engine": "VINCE 2.1.1", "env": "prod", "origin": "https://cveawg.mitre.org/api/cve/CVE-2022-47311" } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2022-47311", "datePublished": "2023-05-22T22:12:51.152Z", "dateReserved": "2022-12-21T17:02:52.831Z", "dateUpdated": "2024-08-03T14:47:29.368Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }